CVE-2022-49859

Source
https://cve.org/CVERecord?id=CVE-2022-49859
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49859.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49859
Downstream
Published
2025-05-01T14:10:13.204Z
Modified
2026-04-02T08:27:59.798687Z
Summary
net: lapbether: fix issue of invalid opcode in lapbeth_open()
Details

In the Linux kernel, the following vulnerability has been resolved:

net: lapbether: fix issue of invalid opcode in lapbeth_open()

If lapb_register() failed when lapb device goes to up for the first time, the NAPI is not disabled. As a result, the invalid opcode issue is reported when the lapb device goes to up for the second time.

The stack info is as follows: [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1958.315979][T11356] RIP: 0010:napienable+0x16a/0x1f0 [ 1958.332310][T11356] Call Trace: [ 1958.332817][T11356] <TASK> [ 1958.336135][T11356] lapbethopen+0x18/0x90 [ 1958.337446][T11356] __dev_open+0x258/0x490 [ 1958.341672][T11356] __devchangeflags+0x4d4/0x6a0 [ 1958.345325][T11356] devchangeflags+0x93/0x160 [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 [ 1958.346738][T11356] inetioctl+0x1c8/0x2d0 [ 1958.349638][T11356] sockioctl+0x5d1/0x750 [ 1958.356059][T11356] __x64sysioctl+0x3ec/0x1790 [ 1958.365594][T11356] dosyscall64+0x35/0x80 [ 1958.366239][T11356] entrySYSCALL64afterhwframe+0x46/0xb0 [ 1958.377381][T11356] </TASK>

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49859.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
514e1150da9cd8d7978d990a353636cf1a7a87c2
Fixed
4689bd3a1b23a1bd917899e63b81bca2ccdfab45
Fixed
ed4940050a7ce7fc2ccd51db580ef1ade64290b1
Fixed
3faf7e14ec0c3462c2d747fa6793b8645d1391df

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49859.json"